Search alternatives:
"protections" » "projections", "protecting"

1
by Göbel, Susanne
Published 2016
Springer Fachmedien Wiesbaden
... pass hierarchical protection domains like firewalls. The work analyses MA’s function principles...

2
by Yan, Song Y.
Published 2015
Springer International Publishing
Subjects: ...Data protection...

3
Published 2014
Springer International Publishing
Table of Contents: ...) -- Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI'14) -- Next Generation...

5
Published 2017
Springer International Publishing
Subjects: ...Data protection...

6
Published 2014
Springer International Publishing
Subjects: ...Data protection...

7
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Broadcast Encryption Schemes for DVD Content Protection -- A Digital Signature Mechanism and Authentication...

9
Published 2019
Springer International Publishing
Subjects: ...Data protection...

10
Published 2018
Springer International Publishing
Subjects: ...Data protection...

12
Published 2017
Springer International Publishing
Subjects: ...Data protection...

13
Published 2018
Springer International Publishing
Subjects: ...Data protection...

16
Published 2016
Springer International Publishing
Table of Contents: ... Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking - A User-Centered...

17 Table of Contents: ...Overload Management -- Temporal Protection -- Multi-Thread Applications -- Synchronization...

18
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted...

19
Published 1986
Springer Berlin Heidelberg
Table of Contents: ... Protection -- Software Protection: Myth or Reality? -- Public Protection of Software -- Fingerprinting Long...

20
Published 1991
Springer Berlin Heidelberg
Table of Contents: ... which are well balanced -- Construction of unequal error protection codes -- Unidirectional error...